InfoSec News

We wish you and your families a very happy 2013 full of peace and prosperity. We greatly appreciate your contributions and we want to thank you because we would not exist without you. We will continue with you next year reporting you the state of the Internet and helping you with the incident response of new emerging threats.

Manuel Humberto Santander Pelez

SANS Internet Storm Center - Handler



e-mail: msantand at isc dot sans dot org
(c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
A number of signs suggest that next year will see a surge in tech companies selling off assets and product lines for both financial and strategic reasons, according to a recent report by consulting firm PricewaterhouseCoopers.
A month ahead of the launch of Research In Motion's BlackBerry 10 operating system, a couple of handsets running the OS have appeared in a U.S. radio regulatory database.
Japan's biggest cellular network operator, NTT DoCoMo, is working with Intel and Samsung on development of the Tizen operating system and the first smartphone based on the platform could be out in Japan in 2013.
LG Electronics is hoping to make its smart TVs more attractive by making it easier to share and find content, while Samsung Electronics is only hinting at what its plans are for 2013.
Pakistan reinstated its YouTube ban on Saturday after it was briefly lifted, reportedly without approval from the country's prime minister, local media reported.
[SECURITY] [DSA 2596-1] mediawiki-extensions security update
[SECURITY] [DSA 2595-1] ghostscript security update
[SECURITY] [DSA 2594-1] virtualbox-ose security update
[SECURITY] [DSA 2593-1] moin security update
GnuPG 1.4.12 and lower - memory access errors and keyring database corruption
Re: CubeCart 5.0.7 and lower versions | Insecure Backup File Handling
Belgian developer Sylvain Munaut has used a lot of open source software and a bit of custom code to convert a Motorola C123 into a wireless transmitter that enabled him to establish a custom GSM network

An intelligent USB memory stick that recognises what type of PC it has been connected to can target and exploit specific vulnerabilities in the host system or masquerade as a totally different USB device in order to spy on supposedly protected data

Oracle Oracle VM Virtual Box CVE-2012-3221 Local Security Vulnerability
BlazeVideo BlazeDVD Playlist Files Remote Memory Corruption Vulnerability
Internet Storm Center Infocon Status